Embedded Android: Porting, Extending, and Customizing


Karim Yaghmour - 2011
    You'll also receive updates when significant changes are made, as well as the final ebook version. Embedded Android is for Developers wanting to create embedded systems based on Android and for those wanting to port Android to new hardware, or creating a custom development environment. Hackers and moders will also find this an indispensible guide to how Android works.

Hackers: Heroes of the Computer Revolution


Steven Levy - 1984
    That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

Starting Out with Java: From Control Structures Through Objects


Tony Gaddis - 2009
    If you wouldlike to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0132989999/ISBN-13: 9780132989992. That packageincludes ISBN-10: 0132855836/ISBN-13: 9780132855839 and ISBN-10: 0132891557/ISBN-13: 9780132891554. MyProgrammingLab should only be purchased when required by an instructor. In "Starting Out with Java: From Control Structures through Objects", Gaddis covers procedural programming control structures and methods before introducing object-oriented programming. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, and an abundance of exercises appear in every chapter. "

The Ant and the Ferrari


Kerry Spackman - 2012
    this is one of those rare books that will change your beliefs - and in doing so will change your life. tHE ANt AND tHE FERRARI offers readers a clear, navigable path through the big questions that confront us all today. What is the meaning of life? Can we be ethical beings in today's world? Can we know if there is life after death? Is there such a thing as Absolute truth? What caused the Big Bang and why should you care?

Eagle's Claw


Morgan Jameson - 2017
    But the Gestapo needs a man-hunter to apprehend an Allied agent who has killed three men, and worse, absconded with Top Secret Luftwaffe documents which detail a secret plan that could alter the course of the war. The Reich cannot let the information, and the man who stole it, make it back to Allied territory. The deal? Catch the killer and the Gestapo will free his family from the death camp where they are jailed. Fail...

The Aviator: A Novel of the Sino-American War (The Aviator: Stories of Future Wars Book 1)


Craig DiLouie - 2021
    

The Greatest Game


Greg Rajaram
    The price we paid for becoming intelligent was to become painfully ignorant of the difference between good and evil.Adi, a 10-year-old boy, works together with two old philosophers as they try to unravel the prophecy of a promised King. With insatiable curiosity, Adi must work with the wise men as they rationalize with each other on why and how humans became intelligent. Together they attempt to answer some of the most profound questions related to existence. Does evolution end with human beings or is there an ‘Overman’ who can reach evolution’s pinnacle? Will this Overman be able to define values for humankind?Centuries later a young boy promises his mother that he will always uphold the love that she has taught him. It is a promise that drowns him in the nectar of the gods. Krish grows up to be an engineer and joins a team of scientists as they try to create artificial consciousness in a machine.Krish soon realizes that he has a bigger fight on his hands. A fight to preserve love in a desolate world. His quest for true love ultimately leads him down a path where he comes face to face with a fearsome snake delivering a kiss of death.Humans have come a long way by questioning the nature of objects around us and pushing the limits of our intelligence, but it’s now time that we ask the greatest question yet: when does intelligence transcend to become consciousness?

Vince Flynn Tp Assortment


NOT A BOOK - 2007
    

The Assassin's Betrayal


Auston King - 2020
    A trained killer. A spy. He'd done bad things, for bad people.He knew what he was. He was a monster.When he was given a target, he'd execute his orders with little prejudice.Clinical efficiency was all that mattered.But his current mission finds himself confronted with the past. And like a bad hangover, the painful memories of what he'd done to get to where he is have left him weak and vulnerable.The only the way out, is to go through hell.He has to kill the woman he loves.If he doesn't, Washington, D.C. will go up in flames.The Assassin's Betrayal is Auston King's shocking debut thriller. It's raw, gritty, and full of twists and turns that will shock you.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Beginning Web Programming with HTML, XHTML and CSS


Jon Duckett - 2004
    It follows standards-based principles, but also teaches readers ways around problems they are likely to face using (X)HTML.While XHTML is the "current" standard, the book still covers HTML because many people do not yet understand that XHTML is the official successor to HTML, and many readers will still stick with HTML for backward compatibility and simpler/informal Web pages that don't require XHTML compliance.The book teaches basic principles of usability and accessibility along the way, to get users into the mode of developing Web pages that will be available to as many viewers as possible from the start. The book also covers the most commonly used programming/scripting language -- JavaScript -- and provides readers with a roadmap of other Web technologies to learn after mastering this book to add more functionality to their sites.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

The C# Player's Guide


R.B. Whitaker - 2012
    

The Spy in a Box


Ralph Dennis - 2019
     Will Hall is a CIA agent in a South American country on the brink of Civil War. But when the moderate, rebel leader that Hall covertly supported is assassinated, the spy resigns and retreats to a cabin in the North Carolina woods. His quiet, civilian life is shattered when an unknown adversary frames him for revealing Agency secrets, putting a kill-on-sight target on his back. Hall runs in a global chase to evade death, clear his name, and free himself from the flawless "box job" that could become his coffin. Praise for Ralph Dennis: "A breathless, lean noir thriller. Every line is razor sharp. Jason Bourne fans will find a lot to like." Publishers Weekly "Ralph Dennis has mastered the genre and supplied top entertainment." New York Times "Believable and constantly thrilling." The Spy Guys & Gals Site "His prose is muscular, swift and highly readable. " Joe R. Lansdale, New York Times bestselling author "Exceptional characterization, strong and vigorous prose." Mystery Scene Magazine "Straight-up, hardboiled crime fiction, written in a tight, evocative voice with a wicked, dark sense of humor." Lee Goldberg, New York Times bestselling author

Liars and Outliers: Enabling the Trust that Society Needs to Thrive


Bruce Schneier - 2012
    We don't do a chemical analysis on food we eat.Trust and cooperation are the first problems we had to solve before we could become a social species. In the 21st century, they have become the most important problems we need to solve — again. Our global society has become so large and complex that our traditional trust mechanisms no longer work.Bruce Schneier, world-renowned for his level-headed thinking on security and technology, tackles this complex subject head-on. Society can't function without trust, and yet must function even when people are untrustworthy.Liars and Outliers reaches across academic disciplines to develop an understanding of trust, cooperation, and social stability. From the subtle social cues we use to recognize trustworthy people to the laws that punish the noncompliant, from the way our brains reward our honesty to the bank vaults that keep out the dishonest, keeping people cooperative is a delicate balance of rewards and punishments. It's a series of evolutionary tricks, social pressures, legal mechanisms, and physical barriers.In the absence of personal relationships, we have no choice but to substitute security for trust, compliance for trustworthiness. This progression has enabled society to scale to unprecedented complexity, but has also permitted massive global failures.At the same time, too much cooperation is bad. Without some level of rule-breaking, innovation and social progress become impossible. Society stagnates.Today's problems require new thinking, and Liars and Outliers provides that. It is essential that we learn to think clearly about trust. Our future depends on it.